yueyueL / XAIforAndroidMalwareView external linksLinks
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?
☆14Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for XAIforAndroidMalware
Users that are interested in XAIforAndroidMalware are comparing it to the libraries listed below
Sorting:
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Jul 4, 2019Updated 6 years ago
- One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.☆18Dec 1, 2022Updated 3 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 2 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated 9 months ago
- Popular Android malware seen in 2022☆31Nov 8, 2022Updated 3 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- 🤖Android malware detection using deep learning, contains android malware samples, papers, tools etc.🐛☆179Oct 12, 2020Updated 5 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- This project allows students to demonstrate their coding skills before entering CodeU. Students will complete this JSON-lite object and J…☆10Apr 27, 2017Updated 8 years ago
- RuneScape Development Kit☆20Jun 18, 2011Updated 14 years ago
- Modeling and simulation of ICS devices☆12Jan 28, 2026Updated 2 weeks ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- Deep Learning Based Android Malware Detection Framework☆40Oct 4, 2020Updated 5 years ago
- ☆42Aug 6, 2021Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- HPetriSim has a graphical editor which provides basic editing and simulation of Petri Nets.☆13Apr 12, 2019Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Feb 6, 2026Updated last week
- Bot for Runescape NXT client (non functional currently)☆12Mar 23, 2021Updated 4 years ago
- A tool to explore ideas generated from artificial intelligence chats.☆10Apr 3, 2023Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- PUPLOOS计算机操作系统,用于操作系统入门教学☆10Apr 19, 2021Updated 4 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- 当今海量的移动应用跟人们的生活、工作、学习、休闲、娱乐等方面密切相关,发挥着重要作用。多数APP在安 装、更新时,都会向用户申请相关手机权限。多数终端用户缺乏鉴别APP所请求的权限是否合理的能力,并且APP安装使用过程中过度索要权限现象较为普遍,这就给用户数据安全、隐私信息泄…☆13Feb 11, 2020Updated 6 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- data json☆12Dec 15, 2025Updated 2 months ago
- A toolkit to get you started with organizing your own hack week!☆12Feb 4, 2022Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago